Improper Validation of Certificate with Host Mismatch in Java-WebSocket
High severity
GitHub Reviewed
Published
May 6, 2020
in
TooTallNate/Java-WebSocket
•
Updated Feb 1, 2023
Description
Published by the National Vulnerability Database
May 7, 2020
Reviewed
May 8, 2020
Published to the GitHub Advisory Database
May 8, 2020
Last updated
Feb 1, 2023
The Java-WebSocket Client does not perform hostname verification.
For more information see: CWE-297: Improper Validation of Certificate with Host Mismatch - https://cwe.mitre.org/data/definitions/297.html
Important note
The OWASP Dependency-Check (https://jeremylong.github.io/DependencyCheck/index.html) may report that a dependency of your project is affected by this security vulnerability, but you don't use this lib.
This is caused by the fuzzy search in the OWASP implementation.
Check out this issue (TooTallNate/Java-WebSocket#1019 (comment)) for more information and a way to suppress the warning.
References